Here’s an interesting link re iv vectors. It says iv can be sent in plain view. 
Hmmm....
http://www.cryptofails.com/post/70059609995/crypto-noobs-1-initialization-vectors

But, I thought having the iv vector in plain view was also a security risk.
Perhaps I’m belaboring this and I apologize if I this discussion is getting 
tedious.

Bill

William Prothero
http://earthlearningsolutions.org

> On Jun 28, 2018, at 3:53 PM, Mark Wieder via use-livecode 
> <use-livecode@lists.runrev.com> wrote:
> 
> Return-Path: <use-livecode-boun...@lists.runrev.com>
> Delivered-To: proth...@earthlearningsolutions.org
> Received: from ssd.earthlearningsolutions.org
>    by ssd.earthlearningsolutions.org with LMTP id iK5OBz9nNVvKBQgAqWmBzQ
>    for <proth...@earthlearningsolutions.org>; Thu, 28 Jun 2018 22:54:55 +0000
> Return-path: <use-livecode-boun...@lists.runrev.com>
> Envelope-to: proth...@earthlearningsolutions.org
> Delivery-date: Thu, 28 Jun 2018 22:54:55 +0000
> Received: from on-rev.com ([37.59.205.90]:45213 helo=var.runrev.com)
>    by ssd.earthlearningsolutions.org with esmtps 
> (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
>    (Exim 4.91)
>    (envelope-from <use-livecode-boun...@lists.runrev.com>)
>    id 1fYfoU-002Cli-VR
>    for proth...@earthlearningsolutions.org; Thu, 28 Jun 2018 22:54:55 +0000
> Received: from localhost ([127.0.0.1]:40505 helo=meg.on-rev.com)
>    by meg.on-rev.com with esmtp (Exim 4.85)
>    (envelope-from <use-livecode-boun...@lists.runrev.com>)
>    id 1fYfnh-0002Uo-3q; Fri, 29 Jun 2018 00:54:05 +0200
> Received: from c.mail.sonic.net ([64.142.111.80]:34500)
>    by meg.on-rev.com with esmtps (TLSv1.2:DHE-RSA-AES128-GCM-SHA256:128)
>    (Exim 4.85) (envelope-from <ahsoftw...@sonic.net>)
>    id 1fYfne-0002Tc-Fv
>    for use-livecode@lists.runrev.com; Fri, 29 Jun 2018 00:54:02 +0200
> Received: from [192.168.0.1] (50-1-85-235.dsl.dynamic.fusionbroadband.com
>    [50.1.85.235]) (authenticated bits=0)
>    by c.mail.sonic.net (8.15.1/8.15.1) with ESMTPSA id w5SMruW6005477
>    (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT)
>    for <use-livecode@lists.runrev.com>; Thu, 28 Jun 2018 15:53:57 -0700
> Subject: Re: Examples of encryption for database access
> To: Brian Milby via use-livecode <use-livecode@lists.runrev.com>
> References: 
> <cwlp265mb038873410294eb2bbf14aefa8f...@cwlp265mb0388.gbrp265.prod.outlook.com>
>    <9f0c3b88-0189-4e92-8d43-c1b344d0f...@major-k.de>
>    
> <cwlp265mb03888246e70c5ff9ad7d3ca38f...@cwlp265mb0388.gbrp265.prod.outlook.com>
>    <677a939f-b639-4097-a466-70ba02221...@gmail.com>
>    <9fd89e75-5162-1468-e67e-3e0a28302...@sonic.net>
>    <9c9c7f4b-b2c7-42da-90ab-0926db177...@gmail.com>
>    <dc79e88a-761f-4cfc-b882-25e0aae45...@gmail.com>
>    <b41a141b-5f10-ee17-ce6e-873684d60...@sonic.net>
>    <a67d8e80-f51e-4fda-b2e4-b348df0e7...@gmail.com>
>    <f9a11613-1c50-48a8-9106-0c779e0aa607@Spark>
>    <4efe880c-d188-400b-31d9-564a0540a...@sonic.net>
>    <ff530caa-ed67-4684-8414-6c37f6fc0...@gmail.com>
>    <1bcf1dcd-f1ab-7bfd-8404-7df1c1b9c...@sonic.net>
>    <05ec683c-5dd8-44ef-8352-6e052f1d3...@earthlearningsolutions.org>
>    <b1c23eff-7f5d-4028-abfd-bf912ded88fa@Spark>
> Message-ID: <281c22d4-20f8-88a3-c2bd-4a7aa85f3...@sonic.net>
> Date: Thu, 28 Jun 2018 15:53:47 -0700
> User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101
>    Thunderbird/52.8.0
> MIME-Version: 1.0
> In-Reply-To: <b1c23eff-7f5d-4028-abfd-bf912ded88fa@Spark>
> Content-Language: en-US
> X-Sonic-CAuth: 
> UmFuZG9tSVYV61H8iJnDK8B78GdZlYqOiytilmPik8b3rpWaN3EnRBEaGwmBl44wO/6mwKUeRD6UgYKrQpGb7glziXUhBLNd
> X-Sonic-ID: C;bmxTIyZ76BGfs641UvMdPQ== M;TH6LIyZ76BGfs641UvMdPQ==
> X-Sonic-Spam-Details: 0.0/5.0 by cerberusd
> X-BeenThere: use-livecode@lists.runrev.com
> X-Mailman-Version: 2.1.20
> Precedence: list
> List-Id: How to use LiveCode <use-livecode.lists.runrev.com>
> List-Unsubscribe: <http://lists.runrev.com/mailman/options/use-livecode>,
>    <mailto:use-livecode-requ...@lists.runrev.com?subject=unsubscribe>
> List-Archive: <http://lists.runrev.com/pipermail/use-livecode/>
> List-Post: <mailto:use-livecode@lists.runrev.com>
> List-Help: <mailto:use-livecode-requ...@lists.runrev.com?subject=help>
> List-Subscribe: <http://lists.runrev.com/mailman/listinfo/use-livecode>,
>    <mailto:use-livecode-requ...@lists.runrev.com?subject=subscribe>
> From: Mark Wieder via use-livecode <use-livecode@lists.runrev.com>
> Reply-To: How to use LiveCode <use-livecode@lists.runrev.com>
> Cc: Mark Wieder <ahsoftw...@sonic.net>
> Content-Transfer-Encoding: 7bit
> Content-Type: text/plain; charset="us-ascii"; Format="flowed"
> Errors-To: use-livecode-boun...@lists.runrev.com
> Sender: "use-livecode" <use-livecode-boun...@lists.runrev.com>
> X-AntiAbuse: This header was added to track abuse, please include it with any 
> abuse report
> X-AntiAbuse: Primary Hostname - meg.on-rev.com
> X-AntiAbuse: Original Domain - earthlearningsolutions.org
> X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
> X-AntiAbuse: Sender Address Domain - lists.runrev.com
> X-Get-Message-Sender-Via: meg.on-rev.com: acl_c_authenticated_local_user: 
> mailman/mailman
> 
>> On 06/28/2018 01:49 PM, Brian Milby via use-livecode wrote:
>> Random IV means that an attacker can not generate a dictionary in advance. 
>> Knowing it at the same time is not an issue since they cypher is not 
>> cracked. The other reason is that the IV seeds the AES encryption so that 
>> the first block does not give anything away. If the first encrypted block 
>> for the same data is always the same, the attacker can use that to test 
>> guesses if they can control what is being encrypted. Same issue if they can 
>> predict the IV. See the Wikipedia entry I linked to for a better discussion.
> 
> Encryption with an initialization vector isn't a reversible operation. It's 
> not like XORing a value with another. Being able to *predict* an iv value, 
> however, as opposed to just knowing the current value, is a security problem.
> 
>> IV is fixed at the block size of the cipher. So for AES it is 16 bytes.
> 
> Yes, I stand corrected. Silly me assumed that aes-256 would use a larger 
> block size. AES uses only 128-bit blocks with different key sizes.
> 
> -- 
> Mark Wieder
> ahsoftw...@gmail.com
> 
> _______________________________________________
> use-livecode mailing list
> use-livecode@lists.runrev.com
> Please visit this url to subscribe, unsubscribe and manage your subscription 
> preferences:
> http://lists.runrev.com/mailman/listinfo/use-livecode
>> On 06/28/2018 01:49 PM, Brian Milby via use-livecode wrote:
>> Random IV means that an attacker can not generate a dictionary in advance. 
>> Knowing it at the same time is not an issue since they cypher is not 
>> cracked. The other reason is that the IV seeds the AES encryption so that 
>> the first block does not give anything away. If the first encrypted block 
>> for the same data is always the same, the attacker can use that to test 
>> guesses if they can control what is being encrypted. Same issue if they can 
>> predict the IV. See the Wikipedia entry I linked to for a better discussion.
> 
> Encryption with an initialization vector isn't a reversible operation. It's 
> not like XORing a value with another. Being able to *predict* an iv value, 
> however, as opposed to just knowing the current value, is a security problem.
> 
>> IV is fixed at the block size of the cipher. So for AES it is 16 bytes.
> 
> Yes, I stand corrected. Silly me assumed that aes-256 would use a larger 
> block size. AES uses only 128-bit blocks with different key sizes.
> 
> -- 
> Mark Wieder
> ahsoftw...@gmail.com
> 
> _______________________________________________
> use-livecode mailing list
> use-livecode@lists.runrev.com
> Please visit this url to subscribe, unsubscribe and manage your subscription 
> preferences:
> http://lists.runrev.com/mailman/listinfo/use-livecode
_______________________________________________
use-livecode mailing list
use-livecode@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription 
preferences:
http://lists.runrev.com/mailman/listinfo/use-livecode

Reply via email to